{"vulnerability": "CVE-2024-8207", "sightings": [{"uuid": "14d32085-b59b-45c6-9dfc-52b3f7a6d77a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8207", "type": "seen", "source": "https://t.me/cvedetector/4240", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-8207 - MongoDB Server Linux Load Path Hijacking Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-8207 \nPublished : Aug. 27, 2024, 12:15 p.m. | 36\u00a0minutes ago \nDescription : In certain highly specific configurations of the host system and MongoDB server binary installation on Linux Operating Systems, it may be possible for a unintended actor with host-level access to cause the MongoDB Server binary to load unintended actor-controlled shared libraries when the server binary is started, potentially resulting in the unintended actor gaining full control over the MongoDB server process. This issue affects MongoDB Server v5.0 versions prior to 5.0.14 and MongoDB Server v6.0 versions prior to 6.0.3.  \n  \nRequired Configuration: Only environments with Linux as the underlying operating system is affected by this issue \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-27T14:53:13.000000Z"}, {"uuid": "9c265660-029b-4b7d-b574-1f82bb7c48f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8207", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16764", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-8207\n\ud83d\udd25 CVSS Score: 6.4 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: In certain highly specific configurations of the host system and MongoDB server binary installation on Linux Operating Systems, it may be possible for a unintended actor with host-level access to cause the MongoDB Server binary to load unintended actor-controlled shared libraries when the server binary is started, potentially resulting in the unintended actor gaining full control over the MongoDB server process. This issue affects MongoDB Server v5.0 versions prior to 5.0.14 and MongoDB Server v6.0 versions prior to 6.0.3.\n\nRequired Configuration: Only environments with Linux as the underlying operating system is affected by this issue\n\ud83d\udccf Published: 2024-08-27T11:28:06.891Z\n\ud83d\udccf Modified: 2025-05-16T23:02:59.895Z\n\ud83d\udd17 References:\n1. https://jira.mongodb.org/browse/SERVER-69507", "creation_timestamp": "2025-05-16T23:35:53.000000Z"}]}